Active Alerts

If you are experiencing a water, power, or sewer emergency or service problem call our 24-hour hotline at 3-1-1 or (415) 701-2311 from outside SF or log on at sf311.org. Learn more or review active service alerts.

Phpmyadmin 4.9.5 Exploit Access

Marco looked at the dark screen of his terminal and whispered to the empty room:

“They’re not gone. They’re just hiding better.”

Marco’s stomach dropped. He checked the database user table. Someone had added a new entry: web_backup with a wildcard host % . The password hash was unfamiliar. The attacker had already backdoored the database. phpmyadmin 4.9.5 exploit

But when the alert pinged his phone at 2:17 AM——he sighed, rolled out of bed, and logged into the client’s legacy server.

He pivoted to the file system. ls -la /var/www/html/uploads/ . A .jpg that wasn’t a JPEG. He downloaded it, ran strings on it. Embedded PHP: <?php system($_GET['cmd']); ?> . Marco looked at the dark screen of his

Marco hated late-night calls.

The museum’s website had been a zombie for days, quietly scanning other networks. The exploit was elegant—silent, slow, untraceable to anyone not watching the advisory logs. Someone had added a new entry: web_backup with

“That version had a user enumeration flaw,” Marco muttered, pulling up his notes. — a nasty little SQL injection vector hiding in the libraries/classes/Controllers/Server/Status/AdvisorController.php file. An attacker could append a malicious WHERE clause to a status query and, with enough patience, extract hashed passwords from the mysql.user table.